Across
- 4. A service that encrypts your online activity and makes your connection appear to come from another location.
- 6. A major internet backbone provider that connects directly with one another without paying for transit.
- 9. Protective software that scans for and removes harmful programs from a system.
- 10. A phishing scheme aimed specifically at high-level officials or executives.
- 11. A digital barrier that filters traffic entering and leaving a network based on security rules.
- 15. A machine that supplies information or services to other devices connected to it.
- 16. Breaking into a computer system or network without permission.
- 17. Online content that is hidden from search engine results but is usually legal and password-protected.
- 18. Sending fake messages that look real in order to trick someone into giving personal information.
- 19. Quietly collecting information about a system without directly engaging with it.
- 20. Using psychological tricks to persuade someone to share private details.
Down
- 1. The final stretch of the network that delivers internet service from a provider to your location.
- 2. A massive global system that links computers and devices together so they can exchange information.
- 3. The publicly viewable part of the internet that search engines can list and display.
- 5. Secretly rerouting someone to a counterfeit website to capture their private data
- 7. An agreed-upon communication standards that control how data moves across networks.
- 8. A security method that requires two or more types of verification.
- 12. Internet providers that rely on higher-level backbone networks for global access.
- 13. A concealed section of the internet accessed through special tools, designed to keep users anonymous.
- 14. A protected facility filled with computer equipment that stores and manages digital information.
